Show filters
1,191 Total Results
Displaying 311-320 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2020-12108

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
Attacker Value
Unknown

CVE-2020-1752

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
Attacker Value
Unknown

CVE-2020-12137

Disclosure Date: April 24, 2020 (last updated February 21, 2025)
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
Attacker Value
Unknown

CVE-2020-1751

Disclosure Date: April 17, 2020 (last updated February 21, 2025)
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-11501

Disclosure Date: April 03, 2020 (last updated February 21, 2025)
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
Attacker Value
Unknown

CVE-2020-6096

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.
Attacker Value
Unknown

CVE-2019-20633

Disclosure Date: March 25, 2020 (last updated February 21, 2025)
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.
Attacker Value
Unknown

CVE-2019-14855

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Attacker Value
Unknown

CVE-2020-10029

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
Attacker Value
Unknown

CVE-2020-9366

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.